security and ethical challenges of infornation technology

41
Security & Ethical challenges in an Organisation VIVEK

Upload: vivekkumaranand

Post on 24-May-2015

941 views

Category:

Documents


1 download

DESCRIPTION

With the proliferation of Electronic Commerce and the “Virtual Office,” threats are becoming an everyday occurrence to business. In fact, more threats arrive daily than business can combat them.

TRANSCRIPT

Page 1: Security And Ethical Challenges Of Infornation Technology

Security & Ethical challenges in an OrganisationVIVEK

Page 2: Security And Ethical Challenges Of Infornation Technology

The government has recently said in Rajya Sabha that 1,600 arrests have been made related to cyber crimes under the Information Technology Act of 2000.

The interesting aspect of these numbers is that the number of cyber crimes has gone up 10 fold in the past couple of years.

Page 3: Security And Ethical Challenges Of Infornation Technology

Introduction

With the proliferation of Electronic Commerce and the “Virtual Office,” threats are becoming an everyday occurrence to business. In fact, more threats arrive daily than business can combat them. Threats to business can happen at any level, such as from

Physical Access Entry to the place of business

The Internet and company Intranet

Lack of Security Policy enforcement

Employees of the business themselves

Wireless Access to the company network, etc.

Page 4: Security And Ethical Challenges Of Infornation Technology

Security Challenges

1. Hacking

Page 5: Security And Ethical Challenges Of Infornation Technology

Hacking

Hacking is often called the biggest danger to the economic security of the Company or Nation.

President Obama has gone on record as calling the cyber threat “one of the most serious and economic and national security challenges we face as a nation.

Page 6: Security And Ethical Challenges Of Infornation Technology

Hacking

By attacking business networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

Page 7: Security And Ethical Challenges Of Infornation Technology

Hacking

Every company is at risk. Even big names are not immune — LinkedIn was the victim of hackers in June, and Google was attacked in 2011, when hackers gained access to hundreds of user accounts.

Page 8: Security And Ethical Challenges Of Infornation Technology

Several News Related to this challenges

Coke Gets Hacked And Doesn’t Tell Anyone

http://www.businessweek.com/news/2012-11-04/coke-hacked-and-doesn-t-tell

Hackers had broken into the company’s computer systems and were pilfering sensitive files about its attempted $2.4 billion acquisition of China Huiyuan Juice Group (1886)

Page 9: Security And Ethical Challenges Of Infornation Technology

Several News Related to this challenges

A Huge Error From Apple Led To A Wired Reporter Getting Hacked Hard (Aug 6 2012)

http://www.businessinsider.com/a-huge-error-from-apple-led-to-a-wired-reporter-getting-hacked-hard-2012-8

One of the biggest stories in the tech world was Wired reporter Mat Honan getting "hacked, hard" in his own words. It's a pretty terrifying tale if you have anything of personal significance on your computer.

Page 10: Security And Ethical Challenges Of Infornation Technology

Hacking

So how do hackers get in the door?

Page 11: Security And Ethical Challenges Of Infornation Technology

Hacking

Email Social Engineering/Spear Phishing

Infection Via A Drive-By Web Download

USB Key Malware

Scanning Networks For Vulnerabilities And Exploitment

Guessing Or Social Engineering Passwords

Wifi Compromises

Stolen Credentials From Third-Party Sites

Insiders

Page 12: Security And Ethical Challenges Of Infornation Technology

Cyber Theft

Crooks are breaking into banks and stealing money. But it’s not Baby Face Aditi or Jesse James Gautam doing the robberies. Today’s thieves and crooks don’t have cool sounding names. These are nameless, faceless, anonymous cyber thieves.

Page 13: Security And Ethical Challenges Of Infornation Technology

Cyber Theft

There is a growing epidemic of online financial transaction theft from American banks and financial institutions. Just since 2008, cyber thieves have stolen millions of dollars from small businesses, school districts, churches, public libraries, municipalities, water districts and nonprofits.

Page 14: Security And Ethical Challenges Of Infornation Technology

Cyber Theft

According to a recent victims’ survey by cyber security giant Symantec, “Corporate Account Takeover” attacks against small businesses doubled in 2012, reported Krebs on Security. While many financial institutions make good on depositors losses from Corporate Account Takeover fraud and theft, many more disclaim any responsibility for such losses.

Page 15: Security And Ethical Challenges Of Infornation Technology

News Related to this challenges

The Western Beaver public school district in Pennsylvania filed a lawsuit against its bank after cyber-thieves used malicious software to siphon more than $700,000 from the school's account at ESB. According to the lawsuit, the funds were transferred in 74 separate transactions over a two-day period.

Page 16: Security And Ethical Challenges Of Infornation Technology

News Related to this challenges

Cyber-crooks stole $1.2 million from Unique Industrial Product Co., a Sugar Land, Texas-based plumbing equipment supply company. The company's operations manager said a forensic analysis showed the attackers used malware planted on its computers to initiate 43 transfers out of the company's account within 30 minutes.

Page 17: Security And Ethical Challenges Of Infornation Technology

News Related to this challenges

Fraudsters struck JM Test Systems, an electronics calibration company in Baton Rouge. According to the company's controller, an unauthorized wire transfer of $45,640 was sent from JM's account to a bank in Russia. The company's bank subsequently provided the company with new credentials. But less than a week later, another $51,550 of JM Test's money was transferred to five money mules across the country. The company was able to recover only $7,200 of the stolen money, which was returned only because one mule who was to receive that transfer apparently closed their account before the transfer could be completed.

Page 18: Security And Ethical Challenges Of Infornation Technology

Cyber Theft

Phishing

Pharming ((Also Domain Spoofing and DNS Poisoning)

Page 19: Security And Ethical Challenges Of Infornation Technology

Cyber Theft

Page 20: Security And Ethical Challenges Of Infornation Technology

Security Challenges

3. Unauthorized use at work

Page 21: Security And Ethical Challenges Of Infornation Technology

Unauthorized use at work

As it becomes easier for people to access computer databases, ease of use means ease of abuse. Using the computer, individual employees can quickly and quietly commit serious crimes that are very difficult to detect. They can steal information, change information, or destroy information in automated file systems while sitting at their desk and doing nothing that appears out of the ordinary to casual observers.

Page 22: Security And Ethical Challenges Of Infornation Technology

Unauthorized use at work

Personnel with technical skills and administrative access to a network are also capable of damaging or impairing the operability of critical information systems. There have been numerous cases of such malicious behavior by disgruntled IT professionals with some level of administrative access to a government or corporate system.

Page 23: Security And Ethical Challenges Of Infornation Technology

Unauthorized use at work

Owing to the magnitude of problems that can be caused by misuse of computer systems, all agencies have a vested interest in maintaining a work environment that fosters high standards of computer security.

Page 24: Security And Ethical Challenges Of Infornation Technology

Potentially Disqualifying Conditions

Illegal or unauthorized entry into any information technology system or component thereof

 illegal or unauthorized modification, destruction, manipulation or denial of access to information, software, firmware, or hardware in an information technology system

use of any information technology system to gain unauthorized access to another system or to a compartmented area within the same system

downloading, storing, or transmitting classified information on or to any unauthorized software, hardware, or information technology system

Page 25: Security And Ethical Challenges Of Infornation Technology

Potentially Disqualifying Conditions

Introduction, removal, or duplication of hardware, firmware, software, or media to or from any information technology system without authorization, when prohibited by rules, procedures, guidelines or regulations

negligence or lax security habits in handling information technology that persist despite counseling by management

any misuse of information technology, whether deliberate or negligent, that results in damage to the national security.

Page 26: Security And Ethical Challenges Of Infornation Technology

Security Challenges

4. Software Piracy

Page 27: Security And Ethical Challenges Of Infornation Technology

Software Piracy

Software piracy is stealing. If you or your company are caught copying and/or distributing illegal copies of software, you could be held liable under both civil and criminal laws. If the software owner decides to sue you or your company, the owner can seek to stop you from using/distributing its software immediately and can also request monetary damages.

Page 28: Security And Ethical Challenges Of Infornation Technology

Consequences of Software Piracy

Increase the chances that the software will not function correctly or will fail completely;

Forfeit access to customer support, upgrades, technical documentation, training, and bug fixes;

Have no warranty to protect themselves;

Increase their risk of exposure to a debilitating virus that can destroy valuable data;

May find that the software is actually an outdated version, a beta (test) version, or a nonfunctioning copy;

Are subject to significant fines for copyright infringement; and

Risk potential negative publicity and public and private embarrassment.

Page 29: Security And Ethical Challenges Of Infornation Technology

Other side of story

The losses suffered as a result of software piracy directly affect the profitability of the software industry. Because of the money lost to pirates, publishers have fewer resources to devote to research and development of new products, have less revenue to justify lowering software prices and are forced to pass these costs on to their customers.

Page 30: Security And Ethical Challenges Of Infornation Technology

Security Challenges

4. Piracy of intellectual property

Page 31: Security And Ethical Challenges Of Infornation Technology

Piracy of Intellectual Property

That piracy of goods embodying intellectual property is an enormous worldwide problem cannot be denied.

Page 32: Security And Ethical Challenges Of Infornation Technology

Piracy of Intellectual Property

The World Customs Organization, for example, has found in its most recent survey that around 5% of all world trade is trade in pirated goods. The European Commission has, in similar terms, concluded that between 5% and 7% of world trade depends on piracy, representing 200 to 300 billion euro in lost trade.

Page 33: Security And Ethical Challenges Of Infornation Technology

Piracy of Intellectual Property

Music

Films

Books

Software

Page 34: Security And Ethical Challenges Of Infornation Technology

Music Piracy

More than one in three CD's sold in the world were pirate products!

In addition, a significant percentage of this lost income would have gone to the music publishers, and the songwriters and composers they represent, as all of these illegal CD's and cassettes embody the unauthorised mechanical reproduction of copyrighted songs and other compositions.

Page 35: Security And Ethical Challenges Of Infornation Technology

Music Piracy – Other side of Story

Secondary to these direct losses are all of the other consequential losses that piracy inevitably triggers: loss of employment opportunities in recording studios and retail stores, as well as losses from all of the other ancillary industries which contribute to the music industry, such as graphic artists and musical editors, video and film support, and marketing, promotional, and advertising experts.

Page 36: Security And Ethical Challenges Of Infornation Technology

Film Piracy

It is estimated that the U.S. motion picture industry loses in excess of US $3 billion annually in potential worldwide revenue due to commercial piracy!

But film industry losses from piracy are not a problem only for the major US studios. Thousands of Bollywood DVDs and CDs are sold in the UK annually, yet it is estimated that at least 4 out of 10 (and some would say as many as 7 out of 10) of these are pirate products.

Page 37: Security And Ethical Challenges Of Infornation Technology

Software Piracy

In the field of computer software, the value of losses to the economy of developed and

developing countries alike is immense, far greater even than that seen with respect to

music and films.

The Business Software Alliance, estimates that thirty-six percent of the

software installed on computers worldwide was pirated in 2003, representing a loss of

nearly US $29 billion.

Page 38: Security And Ethical Challenges Of Infornation Technology

Security Challenges

Summery

Page 39: Security And Ethical Challenges Of Infornation Technology

create a 'culture of security'

Assess risk and identify weaknesses

Create a contingency plan

Educate employees

Implement a security agreement

Page 40: Security And Ethical Challenges Of Infornation Technology

And as far as piracy and intellectual property is concern:

General of the World Intellectual Property Organization, Dr. Kamil

Idris, has observed, "Concerted action, enhanced public awareness, and galvanization of political will to eventually eradicate this problem and its negative effects on society” are all required.

Page 41: Security And Ethical Challenges Of Infornation Technology

Thank You!